ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS

medium Nessus Plugin ID 35009

Synopsis

The remote antivirus service is vulnerable to a denial of service attack.

Description

According to its version, the clamd antivirus daemon on the remote host is earlier than 0.94.2. There is a recursive stack overflow involving the JPEG parsing code in such versions. A remote attacker may be able to leverage this issue to cause the application to recursively scan a specially crafted JPEG, which will eventually cause it to crash.

Solution

Upgrade to ClamAV 0.94.2 or later.

See Also

https://bugzilla.clamav.net/show_bug.cgi?id=1266

http://www.nessus.org/u?91209430

Plugin Details

Severity: Medium

ID: 35009

File Name: clamav_0_94_2.nasl

Version: 1.16

Type: remote

Published: 12/3/2008

Updated: 7/6/2018

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:clamav:clamav

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-5314

BID: 32555

Secunia: 32926

CWE: 399